Intelligent privacy preservation proctol in wireless MANET for IoT applications using hybrid crow search-harris hawks optimization

Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for complex scenarios, including law, military enforcement as well disaster recovery, and emergency rescue. Among different cryptographic algorithms, there is a chance of data hacking according to random key generation. The major...

Full description

Saved in:
Bibliographic Details
Published in:Wireless networks Vol. 28; no. 6; pp. 2713 - 2729
Main Authors: Pamarthi, Satyanarayana, Narmadha, R.
Format: Journal Article
Language:English
Published: New York Springer US 01.08.2022
Springer Nature B.V
Subjects:
ISSN:1022-0038, 1572-8196
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for complex scenarios, including law, military enforcement as well disaster recovery, and emergency rescue. Among different cryptographic algorithms, there is a chance of data hacking according to random key generation. The major purpose of this work is to plan and implement a new security protocol in MANET that is applicable for IoT platforms. The approach focused on this research is the modified chaotic map for encryption and decryption to deal with MANET and IoT data. The privacy preservation model is designed with a suggested cryptographic algorithm for enhancing the privacy and security of the MANET and IoT. An enhanced chaotic map is developed for processing the key generation that maintains the encryption and decryption process and prevents the loss of data while recovering the data. The adaptive key management strategy under the chaotic map is developed in this paper using a hybrid meta-heuristic algorithm named Crow Harris Hawks Search Optimization (CHHSO). Finally, the security analysis and performance evaluation in comparison is made in terms of “statistical analysis, convergence analysis, and communication overhead” that show the improved performance of the proposed model.
AbstractList Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for complex scenarios, including law, military enforcement as well disaster recovery, and emergency rescue. Among different cryptographic algorithms, there is a chance of data hacking according to random key generation. The major purpose of this work is to plan and implement a new security protocol in MANET that is applicable for IoT platforms. The approach focused on this research is the modified chaotic map for encryption and decryption to deal with MANET and IoT data. The privacy preservation model is designed with a suggested cryptographic algorithm for enhancing the privacy and security of the MANET and IoT. An enhanced chaotic map is developed for processing the key generation that maintains the encryption and decryption process and prevents the loss of data while recovering the data. The adaptive key management strategy under the chaotic map is developed in this paper using a hybrid meta-heuristic algorithm named Crow Harris Hawks Search Optimization (CHHSO). Finally, the security analysis and performance evaluation in comparison is made in terms of “statistical analysis, convergence analysis, and communication overhead” that show the improved performance of the proposed model.
Author Pamarthi, Satyanarayana
Narmadha, R.
Author_xml – sequence: 1
  givenname: Satyanarayana
  surname: Pamarthi
  fullname: Pamarthi, Satyanarayana
  email: satya.sp14@gmail.com
  organization: Department of Electronics and Communication Engineering, Sathyabama Institute of Science and Technology
– sequence: 2
  givenname: R.
  surname: Narmadha
  fullname: Narmadha, R.
  organization: Department of Electronics and Communication Engineering, Sathyabama Institute of Science and Technology
BookMark eNp9kMtqHDEQRUWwIX79gFeCrDspqZ9aGuMkA3aymaxFtbp6Rk5bmkgaD-1lvjxyTyCQhRdFldA99bjn7MR5R4xdC_goANpPUQjZNgVImUN1TTG_Y2eibmXRCdWc5Hr5grJ7z85jfASArlTqjP1euUTTZDfkEt8F-4xmzpkihWdM1rv88Cb5iVvHDzbQRDHyh5tvd2s--sBXfs1xt5usWdSR76N1G76d-2AHboI_8EgYzLbYYgg28i0efkbud8k-2ZeFuWSnI06Rrv7mC_bj89369mtx__3L6vbmvjCyUqloq0HVakA1lh21CiugQUEthTLYjJI6EDAIxLqnGkw_NNj3osSqBIV1RWV5wT4c--aLfu0pJv3o98HlkVo2HVRVA43MKnlU5d1jDDTq7MoThlkL0K9e66PXOhuqF6_1nKHuP8jYtByXAtrpbbQ8ojHPcRsK_7Z6g_oD6RKZrg
CitedBy_id crossref_primary_10_1016_j_comcom_2022_12_006
crossref_primary_10_3233_JIFS_232924
Cites_doi 10.1109/TNSE.2020.2970767
10.1007/s11277-017-4923-7
10.1007/s10776-017-0373-0
10.1007/s11277-021-09039-1
10.1016/j.comnet.2020.107743
10.3390/s21237793
10.1016/j.adhoc.2019.102022
10.1007/s10586-019-03028-7
10.1007/s11042-019-7617-1
10.1007/s11227-013-0920-0
10.1109/ACCESS.2020.2990932
10.1007/s11277-017-4713-2
10.1007/s12083-020-01038-6
10.1016/j.future.2021.01.028
10.1109/ACCESS.2020.2991543
10.1016/j.pmcj.2018.01.006
10.1007/s11277-020-07251-z
10.1007/s11277-020-07105-8
10.1007/s11276-021-02850-5
10.1007/s10916-018-1050-2
10.1109/JIOT.2019.2939286
10.1007/s11276-015-1135-5
10.1007/s11235-017-0352-x
10.1108/ijius-05-2021-0028
10.1007/s12652-020-02076-x
10.1109/TII.2019.2960275
10.1007/s13369-020-04896-7
10.1007/s10207-020-00535-2
10.1007/s11036-019-01448-8
10.1007/s13198-021-01173-0
10.1109/JIOT.2019.2944007
10.1007/s11227-019-03003-4
10.1109/ETI4.051663.2021.9619420
10.1109/CAOL46282.2019.9019583
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.
DBID AAYXX
CITATION
3V.
7SC
7SP
7WY
7WZ
7XB
87Z
88I
8AO
8FD
8FE
8FG
8FK
8FL
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
L.-
L7M
L~C
L~D
M0C
M2P
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s11276-022-02986-y
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Science Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central
Business Premium Collection
ProQuest Technology Collection
ProQuest One Community College
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Collection (ProQuest)
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Collection (ProQuest)
Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Pharma Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Science Journals (Alumni Edition)
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Science Journals
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
Business Premium Collection (Alumni)
DatabaseTitleList
ABI/INFORM Global (Corporate)
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central Database Suite (ProQuest)
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1572-8196
EndPage 2729
ExternalDocumentID 10_1007_s11276_022_02986_y
GroupedDBID -59
-5G
-BR
-EM
-ET
-Y2
-~C
-~X
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29R
29~
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
85S
88I
8AO
8FE
8FG
8FL
8FW
8TC
8UJ
8US
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAHTB
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABGDV
ABHFT
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABPEJ
ABQBU
ABQSL
ABSXP
ABTAH
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACGOD
ACHSB
ACHXU
ACKNC
ACM
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADL
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWIH
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCEE
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GROUPED_ABI_INFORM_RESEARCH
GXS
H13
HCIFZ
HF~
HG5
HG6
HGAVV
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I07
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6~
KDC
KOV
KOW
KZ1
LAK
LLZTM
M0C
M2P
M4Y
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QF4
QM1
QN7
QO4
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCO
SCV
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TAE
TEORI
TN5
TSG
TSK
TSV
TUC
TUS
U2A
U5U
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
W7O
WK8
YIN
YLTOR
Z45
Z7R
Z7X
Z7Z
Z83
Z88
Z8M
Z8R
Z8T
Z8W
Z92
ZMTXR
ZY4
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AETEA
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
7SC
7SP
7XB
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c249t-74d959da9f38e79a40ed905219ca6f2e8010d1aa5be50cbd6abb13a4309a54e33
IEDL.DBID RSV
ISICitedReferencesCount 2
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000801195100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1022-0038
IngestDate Wed Nov 05 06:25:42 EST 2025
Sat Nov 29 04:44:25 EST 2025
Tue Nov 18 21:41:59 EST 2025
Fri Feb 21 02:46:10 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Privacy preservation proctol
Adaptive key management strategy
Optimal key generation
Wireless mobile ad-hoc networks
Crow Harris Hawks search optimization
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c249t-74d959da9f38e79a40ed905219ca6f2e8010d1aa5be50cbd6abb13a4309a54e33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2680446062
PQPubID 26318
PageCount 17
ParticipantIDs proquest_journals_2680446062
crossref_primary_10_1007_s11276_022_02986_y
crossref_citationtrail_10_1007_s11276_022_02986_y
springer_journals_10_1007_s11276_022_02986_y
PublicationCentury 2000
PublicationDate 20220800
2022-08-00
20220801
PublicationDateYYYYMMDD 2022-08-01
PublicationDate_xml – month: 8
  year: 2022
  text: 20220800
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle The Journal of Mobile Communication, Computation and Information
PublicationTitle Wireless networks
PublicationTitleAbbrev Wireless Netw
PublicationYear 2022
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Sudhakar, Rao, M. (CR30) 2020; 23
Bhati, Venkataram (CR16) 2017; 97
Jenefa, Anita (CR18) 2018; 98
Chikouche, Cayrel, Mboup, Boidje (CR3) 2019; 75
Bhati, Venkataram (CR17) 2018; 25
Deebak, Al-Turjmanb (CR23) 2020; 97
CR39
Aman, Basheer, Sikdar (CR12) 2019; 6
Yankson (CR24) 2021; 20
Fragkos (CR11) 2021; 18
Lalos, Vlachos, Berberidis, Fournaris, Koulamas (CR10) 2020; 16
Ghosh, Ahmed, Singh, Geem, Sarkar (CR38) 2020; 8
Xu, He, Xu, Qi, Wan, Bhuiyan (CR13) 2020; 7
Alamer (CR31) 2020
Punithavathi, Geetha (CR15) 2019; 78
Wu, Ma, Dai, Wang (CR2) 2021; 185
Kore, Patil (CR21) 2022; 28
Hwang, Hsiao (CR19) 2013; 66
Rao, Kamila (CR37) 2021; 12
Muthusenthil, Murugavalli (CR1) 2017; 23
Geetha, Suntheya, Srikanth (CR32) 2020; 113
CR29
Unnisa (CR35) 2022; 122
Loretta, Kavitha (CR6) 2021; 14
Satyanarayana, Narmadha (CR20) 2021; 124
Arumugam, Srimathi, Maurya, Joseph, Asokan, Poongodi, Algethami, Hamdi, Rauf (CR22) 2021; 21
Prakaash, Sivakumar (CR34) 2019; 11
Zhang, Zhou, Shih (CR36) 2020; 45
Devi, Sathyalakshmi, Subramanian (CR7) 2021
Unnisa, Tatineni (CR28) 2021; 122
Zhou, Wang, Tian, Jiang, Wang (CR9) 2020; 8
Xu, Liu, Xu, Wang, Wan, Yang (CR26) 2020; 25
Gheisari, Najafabadi, Alzubi, Gao, Wang, Abbasi, Castiglione (CR8) 2021; 123
Manjula, Datta (CR4) 2018; 44
Sharavanan, Sridharan, Kumar (CR5) 2018
Ullah, Shah, Wahid, Mehmood, Song (CR25) 2018; 67
Hema, Kuppusamy (CR33) 2020; 112
Dai, Li, Su, Chen, Xu, Fu (CR14) 2020; 7
Satyanarayana, Narmadha (CR27) 2021
R Geetha (2986_CR32) 2020; 113
AM Hema (2986_CR33) 2020; 112
AS Lalos (2986_CR10) 2020; 16
X Xu (2986_CR26) 2020; 25
MN Aman (2986_CR12) 2019; 6
I Ullah (2986_CR25) 2018; 67
N Unnisa (2986_CR28) 2021; 122
Y Zhang (2986_CR36) 2020; 45
P Punithavathi (2986_CR15) 2019; 78
KK Ghosh (2986_CR38) 2020; 8
BS Bhati (2986_CR17) 2018; 25
PT Sharavanan (2986_CR5) 2018
P Satyanarayana (2986_CR20) 2021; 124
B Yankson (2986_CR24) 2021; 20
AS Prakaash (2986_CR34) 2019; 11
GI Loretta (2986_CR6) 2021; 14
P Satyanarayana (2986_CR27) 2021
2986_CR39
X Xu (2986_CR13) 2020; 7
R Manjula (2986_CR4) 2018; 44
M Gheisari (2986_CR8) 2021; 123
G Fragkos (2986_CR11) 2021; 18
P Devi (2986_CR7) 2021
M Dai (2986_CR14) 2020; 7
A Kore (2986_CR21) 2022; 28
BD Deebak (2986_CR23) 2020; 97
N Chikouche (2986_CR3) 2019; 75
C Zhou (2986_CR9) 2020; 8
M Rao (2986_CR37) 2021; 12
J Jenefa (2986_CR18) 2018; 98
A Alamer (2986_CR31) 2020
Y Wu (2986_CR2) 2021; 185
R-J Hwang (2986_CR19) 2013; 66
N Unnisa (2986_CR35) 2022; 122
BS Bhati (2986_CR16) 2017; 97
2986_CR29
B Muthusenthil (2986_CR1) 2017; 23
RV Sudhakar (2986_CR30) 2020; 23
K Arumugam (2986_CR22) 2021; 21
References_xml – volume: 7
  start-page: 2323
  issue: 4
  year: 2020
  end-page: 2335
  ident: CR14
  article-title: A privacy preservation based scheme for task assignment in internet of things
  publication-title: IEEE Transactions on Network Science and Engineering
  doi: 10.1109/TNSE.2020.2970767
– volume: 98
  start-page: 1383
  year: 2018
  end-page: 1411
  ident: CR18
  article-title: Secure vehicular communication using ID based signature scheme
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-017-4923-7
– volume: 25
  start-page: 30
  year: 2018
  end-page: 43
  ident: CR17
  article-title: Performance analysis of privacy protection system during data transfer in MANETs
  publication-title: International Journal of Wireless Information Networks
  doi: 10.1007/s10776-017-0373-0
– volume: 122
  start-page: 3019
  issue: 4
  year: 2021
  end-page: 3051
  ident: CR28
  article-title: Adaptive deep learning strategy with red deer algorithm for sparse channel estimation and hybrid precoding in millimeter wave massive MIMO-OFDM systems
  publication-title: Wireless Personal Communications.
  doi: 10.1007/s11277-021-09039-1
– volume: 12
  start-page: 480
  year: 2021
  end-page: 494
  ident: CR37
  article-title: Cat Swarm Optimization based autonomous recovery from network partitioning in heterogeneous underwater wireless sensor network
  publication-title: International Journal of System Assurance Engineering and Management
– ident: CR39
– volume: 185
  start-page: 107743
  year: 2021
  ident: CR2
  article-title: Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks
  publication-title: Computer Networks
  doi: 10.1016/j.comnet.2020.107743
– volume: 18
  start-page: 1
  issue: 1
  year: 2021
  end-page: 26
  ident: CR11
  article-title: Enhancing privacy in PUF-cash through multiple trusted third parties and reinforcement learning
  publication-title: ACM Journal on Emerging Technologies in Computing Systems (JETC)
– volume: 21
  start-page: 7793
  issue: 23
  year: 2021
  ident: CR22
  article-title: Federated transfer learning for authentication and privacy preservation using novel supportive twin delayed DDPG (S-TD3) algorithm for IIoT
  publication-title: Sensors
  doi: 10.3390/s21237793
– volume: 97
  year: 2020
  ident: CR23
  article-title: A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks
  publication-title: Ad Hoc Networks
  doi: 10.1016/j.adhoc.2019.102022
– volume: 23
  start-page: 2579
  year: 2020
  end-page: 2589
  ident: CR30
  article-title: Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications
  publication-title: Cluster Computing
  doi: 10.1007/s10586-019-03028-7
– volume: 78
  start-page: 25487
  year: 2019
  end-page: 25514
  ident: CR15
  article-title: Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-019-7617-1
– volume: 66
  start-page: 888
  year: 2013
  end-page: 906
  ident: CR19
  article-title: An anonymous distributed routing protocol in mobile ad-hoc networks
  publication-title: The Journal of Supercomputing
  doi: 10.1007/s11227-013-0920-0
– ident: CR29
– volume: 8
  start-page: 81698
  year: 2020
  end-page: 81710
  ident: CR9
  article-title: A top-K query scheme with privacy preservation for intelligent vehicle network in mobile IoT
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2990932
– volume: 97
  start-page: 4063
  year: 2017
  end-page: 4086
  ident: CR16
  article-title: Preserving data privacy during data transfer in MANETs
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-017-4713-2
– volume: 11
  start-page: 395
  issue: 11
  year: 2019
  end-page: 399
  ident: CR34
  article-title: Data analytics and predictive modelling in the application of big data: A systematic review
  publication-title: Journal of Advanced Research in Dynamical and Control Systems
– volume: 14
  start-page: 821
  year: 2021
  end-page: 836
  ident: CR6
  article-title: Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
  publication-title: Peer-to-Peer Networking and Applications
  doi: 10.1007/s12083-020-01038-6
– volume: 123
  start-page: 1
  year: 2021
  end-page: 13
  ident: CR8
  article-title: OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2021.01.028
– volume: 8
  start-page: 83548
  year: 2020
  end-page: 83560
  ident: CR38
  article-title: Improved binary sailfish optimizer based on adaptive β-hill climbing for feature selection
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2991543
– volume: 44
  start-page: 58
  year: 2018
  end-page: 73
  ident: CR4
  article-title: A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs
  publication-title: Pervasive and Mobile Computing
  doi: 10.1016/j.pmcj.2018.01.006
– volume: 113
  start-page: 747
  year: 2020
  end-page: 771
  ident: CR32
  article-title: Cloud integrated IoT enabled sensor network security: Research issues and solutions
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-020-07251-z
– volume: 112
  start-page: 1339
  year: 2020
  end-page: 1354
  ident: CR33
  article-title: A novel trust-based privacy preservation framework for service handling via ontology service ranking
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-020-07105-8
– volume: 28
  start-page: 287
  year: 2022
  end-page: 301
  ident: CR21
  article-title: Cross layered cryptography based secure routing for IoT-enabled smart healthcare system
  publication-title: Wireless Networks
  doi: 10.1007/s11276-021-02850-5
– year: 2018
  ident: CR5
  article-title: A privacy preservation secure cross layer protocol design for IoT based wireless body area networks using ECDSA framework
  publication-title: Journal of Medical Systems
  doi: 10.1007/s10916-018-1050-2
– volume: 6
  start-page: 10441
  issue: 6
  year: 2019
  end-page: 10457
  ident: CR12
  article-title: Data provenance for IoT With light weight authentication and privacy preservation
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2019.2939286
– volume: 23
  start-page: 79
  year: 2017
  end-page: 87
  ident: CR1
  article-title: Privacy preservation and protection for cluster based geographic routing protocol in MANET
  publication-title: Wireless Networks
  doi: 10.1007/s11276-015-1135-5
– volume: 124
  start-page: 349
  year: 2021
  end-page: 376
  ident: CR20
  article-title: Adaptive key management-based cryptographic algorithm for privacy preservation in wireless mobile adhoc networks for IoT applications
  publication-title: Wireless Personal Communications
– volume: 67
  start-page: 553
  year: 2018
  end-page: 575
  ident: CR25
  article-title: ESOT: A new privacy model for preserving location privacy in internet of things
  publication-title: Telecommunication Systems
  doi: 10.1007/s11235-017-0352-x
– year: 2021
  ident: CR27
  article-title: Literature review on network security in wireless mobile Ad-hoc network for IoT applications: network attacks and detection mechanisms
  publication-title: International Journal of Intelligent Unmanned Systems
  doi: 10.1108/ijius-05-2021-0028
– year: 2020
  ident: CR31
  article-title: An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things
  publication-title: Journal of Ambient Intelligence and Humanized Computing
  doi: 10.1007/s12652-020-02076-x
– volume: 16
  start-page: 7765
  issue: 12
  year: 2020
  end-page: 7773
  ident: CR10
  article-title: Privacy preservation in industrial IoT via fast adaptive correlation matrix completion
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2019.2960275
– volume: 45
  start-page: 10949
  year: 2020
  end-page: 10974
  ident: CR36
  article-title: Modified Harris Hawks optimization algorithm for global optimization problems
  publication-title: Arabian Journal for Science and Engineering
  doi: 10.1007/s13369-020-04896-7
– volume: 20
  start-page: 849
  issue: 6
  year: 2021
  end-page: 869
  ident: CR24
  article-title: Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys
  publication-title: International Journal of Information Security.
  doi: 10.1007/s10207-020-00535-2
– volume: 25
  start-page: 713
  year: 2020
  end-page: 724
  ident: CR26
  article-title: Joint optimization of resource utilization and load balance with privacy preservation for edge services in 5G networks
  publication-title: Mobile Networks and Applications
  doi: 10.1007/s11036-019-01448-8
– year: 2021
  ident: CR7
  article-title: An optimal metaheuristic optimization based ElGamal public key cryptosystem for privacy in IoT environment
  publication-title: International Journal of System Assurance Engineering and Management
  doi: 10.1007/s13198-021-01173-0
– volume: 7
  start-page: 2622
  issue: 4
  year: 2020
  end-page: 2629
  ident: CR13
  article-title: Joint optimization of offloading utility and privacy for edge computing enabled IoT
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2019.2944007
– volume: 122
  start-page: 3019
  issue: 4
  year: 2022
  end-page: 3051
  ident: CR35
  article-title: Madhavi Tatineni "adaptive deep learning strategy with red deer algorithm for sparse channel estimation and hybrid precoding in millimeter wave massive MIMO-OFDM systems,"
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-021-09039-1
– volume: 75
  start-page: 8231
  year: 2019
  end-page: 8261
  ident: CR3
  article-title: A privacy-preserving code-based authentication protocol for Internet of Things
  publication-title: The Journal of Supercomputing
  doi: 10.1007/s11227-019-03003-4
– volume: 185
  start-page: 107743
  year: 2021
  ident: 2986_CR2
  publication-title: Computer Networks
  doi: 10.1016/j.comnet.2020.107743
– volume: 23
  start-page: 79
  year: 2017
  ident: 2986_CR1
  publication-title: Wireless Networks
  doi: 10.1007/s11276-015-1135-5
– volume: 12
  start-page: 480
  year: 2021
  ident: 2986_CR37
  publication-title: International Journal of System Assurance Engineering and Management
– volume: 45
  start-page: 10949
  year: 2020
  ident: 2986_CR36
  publication-title: Arabian Journal for Science and Engineering
  doi: 10.1007/s13369-020-04896-7
– volume: 112
  start-page: 1339
  year: 2020
  ident: 2986_CR33
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-020-07105-8
– volume: 23
  start-page: 2579
  year: 2020
  ident: 2986_CR30
  publication-title: Cluster Computing
  doi: 10.1007/s10586-019-03028-7
– volume: 8
  start-page: 81698
  year: 2020
  ident: 2986_CR9
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2990932
– volume: 11
  start-page: 395
  issue: 11
  year: 2019
  ident: 2986_CR34
  publication-title: Journal of Advanced Research in Dynamical and Control Systems
– volume: 122
  start-page: 3019
  issue: 4
  year: 2022
  ident: 2986_CR35
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-021-09039-1
– volume: 18
  start-page: 1
  issue: 1
  year: 2021
  ident: 2986_CR11
  publication-title: ACM Journal on Emerging Technologies in Computing Systems (JETC)
– volume: 20
  start-page: 849
  issue: 6
  year: 2021
  ident: 2986_CR24
  publication-title: International Journal of Information Security.
  doi: 10.1007/s10207-020-00535-2
– volume: 25
  start-page: 30
  year: 2018
  ident: 2986_CR17
  publication-title: International Journal of Wireless Information Networks
  doi: 10.1007/s10776-017-0373-0
– volume: 97
  year: 2020
  ident: 2986_CR23
  publication-title: Ad Hoc Networks
  doi: 10.1016/j.adhoc.2019.102022
– volume: 98
  start-page: 1383
  year: 2018
  ident: 2986_CR18
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-017-4923-7
– volume: 6
  start-page: 10441
  issue: 6
  year: 2019
  ident: 2986_CR12
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2019.2939286
– volume: 16
  start-page: 7765
  issue: 12
  year: 2020
  ident: 2986_CR10
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2019.2960275
– volume: 21
  start-page: 7793
  issue: 23
  year: 2021
  ident: 2986_CR22
  publication-title: Sensors
  doi: 10.3390/s21237793
– volume: 75
  start-page: 8231
  year: 2019
  ident: 2986_CR3
  publication-title: The Journal of Supercomputing
  doi: 10.1007/s11227-019-03003-4
– volume: 7
  start-page: 2622
  issue: 4
  year: 2020
  ident: 2986_CR13
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2019.2944007
– year: 2021
  ident: 2986_CR27
  publication-title: International Journal of Intelligent Unmanned Systems
  doi: 10.1108/ijius-05-2021-0028
– year: 2020
  ident: 2986_CR31
  publication-title: Journal of Ambient Intelligence and Humanized Computing
  doi: 10.1007/s12652-020-02076-x
– volume: 97
  start-page: 4063
  year: 2017
  ident: 2986_CR16
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-017-4713-2
– volume: 78
  start-page: 25487
  year: 2019
  ident: 2986_CR15
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-019-7617-1
– volume: 122
  start-page: 3019
  issue: 4
  year: 2021
  ident: 2986_CR28
  publication-title: Wireless Personal Communications.
  doi: 10.1007/s11277-021-09039-1
– ident: 2986_CR29
  doi: 10.1109/ETI4.051663.2021.9619420
– volume: 113
  start-page: 747
  year: 2020
  ident: 2986_CR32
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-020-07251-z
– volume: 7
  start-page: 2323
  issue: 4
  year: 2020
  ident: 2986_CR14
  publication-title: IEEE Transactions on Network Science and Engineering
  doi: 10.1109/TNSE.2020.2970767
– volume: 123
  start-page: 1
  year: 2021
  ident: 2986_CR8
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2021.01.028
– volume: 25
  start-page: 713
  year: 2020
  ident: 2986_CR26
  publication-title: Mobile Networks and Applications
  doi: 10.1007/s11036-019-01448-8
– volume: 14
  start-page: 821
  year: 2021
  ident: 2986_CR6
  publication-title: Peer-to-Peer Networking and Applications
  doi: 10.1007/s12083-020-01038-6
– ident: 2986_CR39
  doi: 10.1109/CAOL46282.2019.9019583
– volume: 66
  start-page: 888
  year: 2013
  ident: 2986_CR19
  publication-title: The Journal of Supercomputing
  doi: 10.1007/s11227-013-0920-0
– year: 2018
  ident: 2986_CR5
  publication-title: Journal of Medical Systems
  doi: 10.1007/s10916-018-1050-2
– year: 2021
  ident: 2986_CR7
  publication-title: International Journal of System Assurance Engineering and Management
  doi: 10.1007/s13198-021-01173-0
– volume: 124
  start-page: 349
  year: 2021
  ident: 2986_CR20
  publication-title: Wireless Personal Communications
– volume: 67
  start-page: 553
  year: 2018
  ident: 2986_CR25
  publication-title: Telecommunication Systems
  doi: 10.1007/s11235-017-0352-x
– volume: 8
  start-page: 83548
  year: 2020
  ident: 2986_CR38
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2991543
– volume: 44
  start-page: 58
  year: 2018
  ident: 2986_CR4
  publication-title: Pervasive and Mobile Computing
  doi: 10.1016/j.pmcj.2018.01.006
– volume: 28
  start-page: 287
  year: 2022
  ident: 2986_CR21
  publication-title: Wireless Networks
  doi: 10.1007/s11276-021-02850-5
SSID ssj0008399
Score 2.3487499
Snippet Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for complex scenarios, including law, military enforcement as well disaster recovery,...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2713
SubjectTerms Algorithms
Chaos theory
Communications Engineering
Computer Communication Networks
Cryptography
Electrical Engineering
Encryption
Engineering
Heuristic methods
Internet of Things
IT in Business
Mobile ad hoc networks
Networks
Optimization
Original Paper
Performance evaluation
Privacy
Rescue operations
Statistical analysis
Wireless networks
SummonAdditionalLinks – databaseName: Science Database
  dbid: M2P
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELagMMDAG1FeuoENLBLn4XhCFaKCgYqhSGyR4zgUUZrShlZd-eX4UqcFJLow27Ecfee7s-_uO0LOmJIKeddoJjDMyByPJj4XVIswc41J537ql80meKsVPT2JB_vgNrRplZVOLBV1mit8I79kYYSxRydkV_13il2jMLpqW2gskxXj2biY0nXPHmaa2Bh_UUY7zYULQ2C2aGZaOucyjum3ZoSJKKSTn4Zp7m3-CpCWdqe5-d8db5EN63FCYyoi22RJ93bI-jcewl3yeTcj5izA7GMk1QQwQ7Z6sQW0c0XehZceILlx1-hHuG-0btpgnF64y9vwPRIOmE3_DJ0JloOB-d8xTE8U7ciB0SrQkePXIeRGXb3ZOtA98ti8aV_fUtucgSpzYyuoAVEEIpUi8yLNhfQdnQqsBBZKhhnTxvI5qStlkOjAUUkayiRxPel7jpCBrz1vn9R6eU8fEIhSxrnDdMaD1FdZIJXx8TKtAxFxkURRnbgVMrGyzOXYQKMbzzmXEc3YoBmXaMaTOjmffdOf8nYsnH1cQRjbMzyM5_jVyUUlBPPhv1c7XLzaEVljpdxhFuExqRWDD31CVtWoeBkOTksJ_gLrA_ir
  priority: 102
  providerName: ProQuest
Title Intelligent privacy preservation proctol in wireless MANET for IoT applications using hybrid crow search-harris hawks optimization
URI https://link.springer.com/article/10.1007/s11276-022-02986-y
https://www.proquest.com/docview/2680446062
Volume 28
WOSCitedRecordID wos000801195100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1572-8196
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0008399
  issn: 1022-0038
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwED-xjQd44BvRsVX3wBtYcpwP24_b1Gl7aFWVAoWXyHGcdaK0qM029ZW_fL40acs0kODFUhTHSnz2_c65u98BvBPWWOJdY4UmN6PgIcsiqZnTSRF4SJdRHlXFJmSvp0Yj3a-TwhZNtHvjkqw09SbZLRCSAmYFI9rwhC13YM_DnaKCDYOPn9f610O-rnyc1JOHqk6VuX-M3-FoY2PecYtWaHP69P_e8xk8qa1LPFoth-fwwE1fwOMtzsGX8Ot8TcJZoh_52tglUjRs83cWCdPK2QQvp0hExhOvC7F71OsM0Ru4eD4b4rbXGyly_gLHS0r9Qv-VN7jaPWxs5l6D4NjcfF_gzKumH3XO5yv4dNoZnpyxuhADs_50VjIvMB3r3OgiVE5qE3GXa8r61dYkhXAe5XgeGBNnLuY2yxOTZUFoopBrE0cuDF_D7nQ2dW8AVS6k5MIVMs4jW8TGenuucC7WSupMqRYEjTxSW7OUU7GMSbrhV6b5Tf38ptX8pssWvF8_83PF0fHX3geNmNN6vy5SkSjybPNEtOBDI9bN7T-Ptv9v3d_CI1GtDIogPIDdcn7lDuGhvS4vF_M27MgvX9uwd9zp9Qf-qstPqBV93_bjb-1qnd8C71f1Cw
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB1VBQl64Bt1aYE5wAksEm8SxweEKmjVVdtVD4vUW3Ach6263ZTdtKtc-UH8RmbysVuQ6K0Hzk4c2Xl-Hntm3gC8kdZY1l0TuWY3o_T6Ig2UFk5HuU9bugqyoC42oYbD-OREH6_Bry4XhsMqO06siTorLN-Rf5BRzL5HL5KfLn4IrhrF3tWuhEYDiwNXLejINv84-EL_962Ue7ujz_uirSogLB01SkFf16HOjM77sVPaBJ7LNKewamuiXDqibC_zjQlTF3o2zSKTpn7fBH1PmzBwfAFKlH8nYGUxDhWUx0vmJ2ND195VOuCxy61N0mlS9XypONyXWqSOI1H9uRGurNu_HLL1Prf38H-boUfwoLWocadZAo9hzU2fwMY1ncWn8HOwFB4tkcZ9ZWyFHAHc3Ugj7-NlMcHTKbJ484T4H492hrsjJKMeB8UIr3v6kbMFvuO44nQ3pPldYDNwMTYzYk0cm8XZHAui4_M2z_UZfL2VSXgO69Ni6jYB40wq5UmXqzALbB4aSzZs7lyoY6XTOO6B3yEhsa0yOxcImSQrTWlGT0LoSWr0JFUP3i3fuWh0SW58eruDTNJy1DxZ4aUH7zvQrZr_3duLm3t7Dff2R0eHyeFgeLAF92WNeY6Y3Ib1cnbpXsJde1Wezmev6tWD8O22wfgbmYZWTQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB5VBSF64I0IFJgDnGBVe2N7vQeEKtqIqBDlEKSKi1mv16QijUtiGvnKz-LXMeNHUpDorQfOtlf2-Nt57Mx8A_BCWmOZd03kmtOM0uuLNFBaOB3lPpl0FWRBPWxCjUbx8bEeb8GvrheGyyo7nVgr6qywfEa-J6OYc49eJPfytixifDB4e_Zd8AQpzrR24zQaiBy5akXh2_LN8ID-9UspB4eTd-9FO2FAWAo7SkFvokOdGZ33Y6e0CTyXaW5n1dZEuXSkvr3MNyZMXejZNItMmvp9E_Q9bcLA8WEoqf9rimJMLicch5_XVoAcD11nWinY4_Rb27DTtO35UnHpL12ROo5E9adR3Hi6fyVna5s3uP0_S-sO3Go9bdxvtsZd2HLze7BzgX_xPvwcrglJSyQZnBtbIVcGdyfVyPa9LGZ4MkcmdZ6RXcCP-6PDCZKzj8NighcrAJC7CL7itOI2OCRZr7D5cDE1C9KmODWrb0ssSE2ftv2vD-DTlQjhIWzPi7l7BBhnUilPulyFWWDz0FjybXPnQh0rncZxD_wOFYltGdt5cMgs2XBNM5ISQlJSIympevBq_cxZw1dy6d27HXySVnctkw12evC6A-Dm8r9Xe3z5as_hBmEw-TAcHT2Bm7KGPxdS7sJ2ufjhnsJ1e16eLBfP6o2E8OWqsfgbWctfOQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Intelligent+privacy+preservation+proctol+in+wireless+MANET+for+IoT+applications+using+hybrid+crow+search-harris+hawks+optimization&rft.jtitle=Wireless+networks&rft.au=Pamarthi%2C+Satyanarayana&rft.au=Narmadha%2C+R.&rft.date=2022-08-01&rft.issn=1022-0038&rft.eissn=1572-8196&rft.volume=28&rft.issue=6&rft.spage=2713&rft.epage=2729&rft_id=info:doi/10.1007%2Fs11276-022-02986-y&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11276_022_02986_y
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1022-0038&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1022-0038&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1022-0038&client=summon